SESSION 3: Domestic Developments
Richard James Burgess American Association of Independent
Music: Not much different from 2016. Notice and takedown hasn’t helped with
staydown; still need to send lots of notice. Optimistic about EU Copyright
Directive.
Alex Feerst Medium: Runs Trust & Safety—moderators’
dilemma and the way that red flag knowledge hangs over a team trying to make a
thoughtful and civil space while taking down violent/terrorist content.
Devlin Hartline Center for the Protection of Intellectual
Property, Antonin Scalia Law School, George Mason University: 512 is not intended
to be solely notice and takedown regime; incentives to cooperate to detect
& deal with © infringement. Service providers were to play a role in
preventing infringement, finding and removing it w/o input from © owners,
through red flag knowledge standards. Lose safe harbors if aware of
facts/circumstances from which infringing activity is apparent. Courts have
read this so narrowly that a fire engine on fire would be necessary. Google’s
ability to index the Pirate Bay is an example. Properly understood, red flag knowledge
is general knowledge of infringement on the platform, not specific
infringements, and the burden of investigating should fall on the service
provider.
Catherine Gellis The Copia Institute: Don’t let the sky is falling rhetoric skew the recommendations.
The sky is rising—the pie is growing, there is more revenue, more works due to
the internet. Really careful not to kill the golden goose. Copia Institute just
released a report aggregating a lot of the data providing the evidentiary
record. There’s still cause for alarm
about pressures on platforms and individual creators: the effect of
unadjudicated claims of infringement. This is the only area of law where
reactions are required where there is never any adjudication.
Eric Goldman Santa Clara University School of Law: 512(f): pulled
all of the cases since 2017; about 25 such cases, less than ½ substantively
analyzed. I didn’t find any cases where a plaintiff actually won in court
during the period; not inconsistent w/past jurisprudence, w/only 2 512(f) victories
in 21 years.
Joseph Gratz Durie Tangri LLP: Not that many cases since the
last set of roundtables. The system is basically working; the players have reached
a rough modus vivendi leading to less large-scale litigation on the order of
Giganews or Viacom. The case law shows
the flexibility of current law and the ability of courts to take into account
specific situations, whether that is in the context of repeat infringers,
expeditious removal, willful misrepresentation.
Jared Polin FroKnowsPhoto: YT channel/photographer. I built everything off of free, hoping people
will support me with what I sell. I have
two full time employees from the channel.
Tamber Ray NTCA ― The Rural Broadband Association: 850 rural
broadband providers, covering 33% of the US landmass, the sole provider in many
of their communities. Hard to reconcile Cox/Grande and Peckingham cases. They
have followed through on suspending repeat infringers, but are still getting
the same number of infringement notices. Want guidance on responsibilities.
Robert Schwartz Consumer Technology Association: Toleration,
accommodation, and implied license matter a lot. Overenforcement would hurt the
creators it intended to help.
Christian Troncoso Business Software Alliance: Dual
interests—content providers & hosts. There are frustrations on content
protection side, but enterprise cloud service operators also have frustrations—tends
to show that the compromise was fair in the end. End users are also important
stakeholders subject to the outcomes here.
Kate Tummarello Engine: American ecosystem is thriving due
to laws such as the DMCA. Startups support safe harbors to avoid ruinous
infringement claims. Bad actors send false notices to startups and that’s a
problem but we support the overall framework.
Ping Wang Freelancer/writer: user involvement.
Nancy Wolff Digital
Media Licensing Association: Fingerprinting tech is available, but little
incentive to do any type of filtering, and little incentive to develop
licensing systems. Curation makes a better website, but there aren’t licensing
models. [I have the sad feeling that
most of the people here don’t know what Livejournal is/was; the description in
the case comes close to describing the specific community at issue but has no
relationship whatsoever to the journaling function that the site mainly and
overall supports.]
Q re 512(f).
Gratz: not a sufficient deterrent for many kinds of abusive
notices and counternotices. There haven’t been many litigated cases b/c what’s
at stake isn’t always enough to support litigation. We may be seeing a greater
number of those cases even under the current standard, not b/c of Lenz, but b/c
of increasing and new ways that internet intermediaries are part of economic
activity, as on Etsy. The competitive incentives to send bogus notifications
and counternotifications will become so large that they’ll provide economic
incentives for litigation.
Isbell: Etsy alluded to fraud in notices/counternotices; use
for harassment. Goldman mentioned
several cases since we last heard from people but no plaintiffs have won. Is that a good thing/bad thing? Problem w/law or courts?
Goldman: data suggest that either there aren’t abuses worth
litigating or that the law is miscalibrated to protect against those abuses,
and the evidence suggests the latter. There’s no real incentive to do homework
before sending a notice. There’s also often a lot of background dispute
information, e.g., a dispute over a screenplay. The ISP is not in a good place
to resolve that. The notice is a way for the parties to fight.
Greenberg: relatively few counternotices are filed; abusive
counternotices exist too. 512(f) case of Johnson v. New Destiny Community Church—courts
apply the same standards to both?
Goldman: correct. There are so many things that have to go
right for a counternotice to be filed in the first place—the user has to know
their rights and be willing to take the risk.
The system has little to encourage that.
Smith: if you’re focused on users being educated & confident
enough, then would it make it harder for users to file counternotice if you
loosen up standard for liability for false notices?
Goldman: they’re a nonfactor today so it wouldn’t have a
material effect on the filing of counternotices. Focusing on abuses of notices
is the place to start.
Polin: YT hits me with claims—many times I have permission
or it’s fair use. It’s simple to file a counternotice on YT. I generally win b/c we try to stick to good
practices including on fair use. YT does
a good job for us.
Wolff: visual content online: the counternotice really puts
the content owner at a disadvantage, particularly if the counternotice is in
bad faith, b/c you can’t afford to go to court and file a claim w/in 10 days.
If you don’t have a © registration before that, you have to spend $800 and find
a lawyer. Improper counternotifications are harmful.
Wang: EU’s Directive provides an answer. YT is only part of the ecosystem. 100s of my pieces are taken on other
sites. Google can fix it easily but they
don’t because they earn money.
Q: where are these posted?
Wang: around the world where there are Chinese communities—different
websites. I don’t blame small forums w/a
couple hundred people but Google has an easier solution. I shouldn’t have to file a notice. They
should have to ask permission before they use my stuff.
Gratz: counternotices v. notices. It’s not that anyone who fails to send a counternotice
worries about 512(f). They worry about whether it will lead to litigation, even
when they’re very certain they’d prevail. Even if you’re really sure that the
dragon is wrong, you’re waking a sleeping dragon.
Gellis: Notice gaming is a problem—people are sending
notices to ensure that speakers use up their strikes. The more important it is
for a platform, esp. the larger platforms, to have a specific rubric about how
many complaints they have to receive before they terminate a speaker, the
easier it is to game that to eliminate a speaker that someone doesn’t like.
Greenberg: are there studies on this?
Gellis: anecdotal accounts.
[I
collect these. One
link. Another.
There are also a bunch mentioned in Google’s additional comments from last time
around. EFF also submitted additional comments
on this last time around, e.g.:
One OSP surveyed in the study by
U.C. Berkeley School of Law researchers described “cases where allegedly
abusive ex-husbands have filed DMCA complaints against images their ex-wife had
posted as a means of attempting to get her current address.” According to an
amicus brief filed on her behalf in Lenz v. Universal Music, when YouTube
creator Rebecca Prince considered filing a counter-notice in response to an
abusive notice, she “feared that gaining her sensitive information was in fact
what this person wanted so he or she could use it to ‘dox’ her – that is, to
release her identifying information online to further harass and intimidate her
…
[RT continues: the most recent empirical study
of which I am aware suggests that there are a lot of ungiven counternotices
for plausibly noninfringing content, but that study doesn’t get to the level of
sorting abuse v. mistake. We also have a
qualitative decision to make about how much we care about one instance of
doxxing per X instances of accurate or wrong-but-reasonable notifications.]
Hartline: of course bogus takedowns are a problem, but
hyperfocus on this misses the forest for the trees. Google’s transparency
report: over 4 billion URLs, vast majority of which are illegit [which gets
back to the basic point, which is that not everyone is Google—like Amazon
Kindle, many sites receive more bogus takedowns than legit takedowns. If you
make © policy for Google, you will ensure that only Google survives.]. Lenz was
wrong b/c not having bad faith is not the same thing as having good faith.
Feerst: when we get a notice that seems defective/doesn’t
seem to make sense, we often engage w/ the sender. There’s a large number of
folks who don’t get the gravity of sending a takedown—they say things like “I’m
not gonna do your job for you” and don’t provide a URL or a name. We want to help folks give us information if
content is truly bad. But the relative sloppiness of what we get is just a
frustration.
Smith: it sounds like the “expeditious” flexibility you have
is helping you figure out what’s really going on.
Feerst: the way you’re framing it, the risk that we have to
take on is that “expeditious” might be defined later. We do take on additional
risk to help folks. Whether that’s fair
is another Q.
Smith: you’re comfortable with the risk.
Feerst: not how he’d put it.
Isbell: automated notices v. forms: any change?
Burgess: concern about emphasis on hearsay and rumor. Small content owners have given up.
Polis: as a small content creator, doesn’t want the gatekeepers
shutting the gates again. Some musicians
may not be making as much money, but you have to use what’s here today. Lots of
the musicians I photograph, I have a larger online presence than they do.
Q: re automated notices.
Ray: we get notices from multiple sources and can’t verify
that they’re all legit. Or we get multiple notices for the same song for the
same user and we can’t determine what is duplicative. If we get multiple notices from different
email accounts for the same user and same content, a P could say “you got 100
notices about this account on the same day and acted only on one.” Huge recordkeeping burden.
Wolff: we’ve always had a level of human involvement—have to
check whether a work was licensed or not.
She recommends that members say they considered fair use in their threat
letters. The problem is the system itself; many have given up.
Greenberg: numbers of notices as strength v. weakness?
Gratz: not here for Google, though previously represented
them. The number verges on meaningless b/c the vast bulk are for sites or items
that were never indexed in the first place. People use the Google search result
takedown form as a general “I haven’t seen this on Google, but this link
infringes” form. So the number isn’t likely to be particularly meaningful
especially at the difference between double-digit millions primarily sent by
automated systems.
Troncoso: Ideal structure for takedown framework: part of
the difficulty is the sheer diversity of stakeholders under the statute—search engines,
social media, enterprise cloud companies that provide services to other 512(c)
systems—coming up w/ a single system that works for all is different. So too
with content, types of industries, types of licensing. That’s why we think the
DMCA has done a fairly good job allowing for bespoke systems to arise. Google
is doing things not required by the statute, like deindexing content before it
appears. Google has the incentive to make sure they’re limiting the resources
they have to throw at the problem before the links populate. Balancing the
interests of all actors is not easy but all things considered the DMCA is
pretty good.
Schwartz: Google is also a member of CTA, whose view has been
that w/all these variables and difficulties the burden for initiation has to be
on the rightsholder.
Goldman: a lot of activity is outside the scope of (c) and
(f) altogether—the waning scope of both of those laws. First, the fastlane for
rightsholders—more trusted interactions w/ the service and their actions aren’t
covered by (c) or (f). Second,
prefiltering-type removals aren’t within those provision either. Could we develop an optimal scheme for (c) or
(f)? First we have to recognize the
decreasing percentage of these interactions actually covered.
Wong: Google claims to pay lots to creators and to remove
links, but never tell us how much money they made by using content w/o
permission.
Hartline: Lenz is wrong: absence of good faith isn’t bad
faith. Wrong as a matter of policy: if you don’t have to consider fair use, why
don’t you have to consider the other defenses? Even w/in Lenz, you can use an
algorithm to assess whether you can take something down. It’s much harder to
assess whether something is noninfringing than it is to assess whether it’s infringing. [This is an obviously nonsensical statement
that is justified by the larger explanation that fair uses are
infringing-but-excused, but that’s not true even if you disregard the words of
the statute (which you should not) and just think about the broader difference
between a defense and excuse. It is
particularly interesting to find this argument made alongside the argument that
the absence of good faith isn’t bad faith.
That one’s actually more understandable!]
Gratz: a good heart and an empty head is not good enough for 512.
Burgess: the DMCA is not working according to any content
creators I know. [The 1936
Literary Digest poll might have some lessons.]
Isbell: 512(h) and (j)?
Gellis: we’ve also ignored 512(h). There hasn’t been a ton of caselaw
percolating. Not convinced there’s
adequate protections built in for users, however we consider the subpoena
interests. Due process right to anonymous speech should be meaningful.
Gratz: a large number of subpoenas from Strike 3 Holdings!
In a number of other cases where subpoenas issued, many courts have because of
potentially embarrassing nature of material at issue put protections in place
to allow cases to proceed w/o permitting the public disclosure of the identity
of the accused infringer. That’s an important development that helps separate
out © from anonymity interest and protects against reputation threats used as
leverage.
Wolff: porn cases skew decisions. Uploading content shouldn’t
be equivalent to engaging in speech, if it’s not your own. [I’ll remember that the next time I recite
the kaddish.] Can’t necessarily determine
whether someone is even in the US.
Goldman: 512(h) is an artifact of a different time; wouldn’t
be drafted the same way today. We don’t provide court-unsupervised access to
others’ identity in other situations. Elsewhere, identifying a tortious actor
requires a court’s permission. That’s not the deal we’d strike today; an anachronism.
The fast lane has become a source of copyright trolling—lawsuits with the sole
intent of extracting settlements. Noteworthy when a judge said that wouldn’t be
allowed. In the WHOIS context, the availability
of info about domain name registrants won’t automatically be given, and most
registrants use a privacy service. 2010s model would give more weight to
privacy.
Isbell: 512(j): is that just DOA? Do we care? Should we
care?
Goldman: Has logged every 512(j) case he’s seen; was
supposed to be integral part of the structure. It was supposed to let ISPs
avoid financial liability but allow ©
owners to get injunctive relief. They could do that and he doesn’t understand
why that hasn’t been more widely explored.
Ray: 512(h): echoing previous statements—subpoenas are used
not to protect © but to gain access to personal information used to threaten embarrassment.
We want help figuring out what to do; some targets may be outside the court’s
jurisdiction.
Gratz: puzzled about the same thing as Isbell. Lack of 512(j) cases is an indication of how cooperation has happened between OSPs and takedown senders, not in the sense of holding hands and trying to do best possible solutions, but instead in that 512(j) allows you to force the OSP to do what it is otherwise incentivized to do—to take things down, terminate subscribers who are habitual infringers. Because those things happen anyway w/o the injunction, we don’t see a lot of those injunctions; their purpose has already been achieved.
Isbell: repeat infringers?
Tumarello: appreciate the flexibility of Motherless, but
some certainty is really important for startups who want to know they’re doing
the right thing, tell investors.
Isbell: what would do that? Statutory reform, best
practices?
Tumarello: anything that was consensus-based and reflected
the views of small companies. We’d want startups to have input.
Schwartz: We got into Cox as amicus on contributory infringement
side. Generally, one thing that hasn’t been mentioned is the terrific abuse
that was part of the notices that Cox received. They rejected the ones that had
license offers attached to them; the courts have generally taken a dim view of
those types of “notices.” That’s not to justify the other unfortunate things
Cox did.
Gellis: Cox dealt with this head-on: Cox’s argument was that
accruals for termination shouldn’t be contingent on anything but adjudicated
claims. The problem w/ the system is that an allegation can have such an effect
on a speaker and on a platform. The Cox court wasn’t worried but it is a big
problem, because it turns into a prior restraint based on a nonadjudicated
claim. Undercurrent: sometimes infringing is black and white, and sometimes
noninfringing is, but often it’s not. Seeing a watermark, for example, is
ambiguous. You need more information in many
cases! The senders are getting it wrong; if the senders do, the platforms have
no hope of doing so either. They’re forced to defer to the complaint and
presume it legitimate, which is hostile to expression and to the future rights
of users—YouTube strikes accrued are serious concerns for speakers because
their entire channel can be taken away.
Smith: Cox isn’t really about the expression of repeat
infringers. If we don’t want the perfect
to be the enemy of the good, is there any room for these policies?
Gellis: as Schwartz says, there were significant problems
with huge numbers of the claims Cox received and the district court rejected
many of those notices. But the court
ignored the impact of having such a barrage of bad claims on Cox’s duty to
regard the remainder of them as valid, despite its experience showing that so
many were invalid in form and substance.
The court didn’t like Cox blacklisting Rightscorp but didn’t discuss why
it had been blacklisted. Even if we want to treat filesharing differently, we
can’t ignore the abuse there—and we can’t just transfer those rules to social
media where there’s a lot more expression.
Gratz: yes, a continuum is critically necessary in the context
of repeat infringer policies. Different kinds of ISPs, different kinds of
subscribers, different kinds of activities—all factor into what kind of policy
is reasonable and whether a particular user should be terminated. ISPs that
care take that all into account, wanting to get rid of abusers but not noninfringing
speech or users who make mistakes. The difference between conduit ISPs and edge
services is very important here.
Consider the Copyright Alert system: a way of doing graduated response
where the ultimate sanction was very serious: conduit termination. The reason
Packingham is important is not necessarily b/c the First Amendment imposes
limits on Congress’s ability to act here, though it may, but b/c it points out
as a policy matter that these other things of importance to us as a society—child
abuse—yield to the necessity of access to the internet.
Greenberg: (a) and (c) have different requirements in the statute,
though Cox may change obligations of (a) services. How are conduits reconciling
that their obligations may be not that different?
Gratz: From the POV of a conduit service—it’s still not a
notice and takedown situation; it factors
into whether someone is a repeat infringer.
Ray: Qs: what are our obligations to forward notices? Do we
have to forward settlement demands? A big Q for our members. Invalid DMCA notices, e.g. when they’re sent
to our non-DMCA agent—can we disregard those when we have a valid DMCA agent
& address? Members are concerned
w/Grande. It put a pretty hefty obligation
on ISPs w/o taking into account concerns about number of valid/invalid email
addresses and notices. Also, what do we do with public wifi? Tech helps some for P2P networking—availability
of streaming services has changed member behavior—but what happens when
members/subscribers have open wifi? Subscribers
are often happy to operate open wifi & another person can sit on the street
and use it. What are we to do? Also a
need for coordination w/states/FCC. Service
is considered a fundamental service so disconnecting someone is a big deal to
avoid trouble w/states.
Feerst: strategic uses of batching/attempts to silence
users: we do see it in our Lumen notices. It’s not frequent but it’s real. An investigative journalism publication out
of Ecuador was using Flickr photos of politicians posted by the gov’t of
Ecuador. Gov’t send takedown notices and a request to ban account for
infringement. That’s marginal now but
suggests potential for mischief around repeat infringer policy. The risk of having to go to summary judgment
is a six-figure cost that can be deadly for a startup. He had no guidance in making that risk
determination.
No comments:
Post a Comment